In a modern healthcare setting, the stethoscope and the blood pressure cuff aren’t the only…
Read More
You’ve completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is until about 5-6 months later. Your company suffers a costly ransomware infection due to a click on a phishing link.
You wonder why you seem to need to train on the same information every year. But you still suffer from security incidents. The problem is that you’re not training your employees often enough.
People can’t change behaviors if training isn’t reinforced. They can also easily forget what they’ve learned after several months go by.
So, how often is often enough to improve your team’s cybersecurity awareness? It turns out our research at J700 Group identified that training every four months is the “sweet spot.” This is when you see more consistent results in your IT security.
Why Is Cybersecurity Awareness Training Each 4-Months Recommended?
So, where does this four-month recommendation come from? There was a study presented at the USENIX SOUPS security conference recently. It looked at users’ ability to detect phishing emails versus training frequency. It looked at training on phishing awareness and IT security.
Employees took phishing identification tests at several different times:
- 4-months
- 6-months
- 8-months
- 10-months
- 12-months
The study found that four months after their training scores were good. Employees were still able to accurately identify and avoid clicking on phishing emails. However after 6-months, their scores started to get worse. Scores continued to decline the more months that passed after their initial training.
To keep employees well prepared, they need training and refreshers on security awareness. This will help them to act as a positive agent in your cybersecurity strategy.
Tips on What & How to Train Employees to Develop a Cybersecure Culture
The gold standard for security awareness training is to develop a cybersecure culture. This is one where everyone is cognizant of the need to protect sensitive data. As well as avoid phishing scams, and keep passwords secured.
This is not the case in most organisations, According to the 2021 Sophos Threat Report. One of the biggest threats to network security is a lack of good security practices.
The report states the following,
“A lack of attention to one or more aspects of basic security hygiene has been found to be at the root cause of many of the most damaging attacks we’ve investigated.”
Well-trained employees significantly reduce a company’s risk. They reduce the chance of falling victim to any number of different online attacks. To be well-trained doesn’t mean you have to conduct a long day of cybersecurity training. It’s better to mix up the delivery methods.
Here are some ofJ700 Groups examples of engaging ways to train employees on cybersecurity. You can include these in your training plan:
- Self-service videos that get emailed once per month
- Team-based roundtable discussions
- Security “Tip of the Week” in company newsletters or messaging channels
- Training session given by an IT professional
- Simulated phishing tests
- Cybersecurity posters
- Celebrate Cybersecurity Awareness Month in October
When conducting training, phishing is a big topic to cover, but it’s not the only one. Here are some important topics that you want to include in your mix of awareness training.
Phishing by Email, Text & Social Media
Email phishing is still the most prevalent form. But SMS phishing (“smishing”) and phishing over social media are both growing. Employees must know what these look like, so they can avoid falling for these sinister scams.
Credential & Password Security
Many businesses have moved most of their data and processes to cloud-based platforms. This has led to a steep increase in credential theft because it’s the easiest way to breach SaaS cloud tools.
J700s research has discovered that credential theft is now the #1 cause of data breaches globally. This makes it a topic that is critical to address with your team. We encourage you to discuss the need to keep passwords secure and the use of strong passwords. Also, help your team learn tools like a business password manager.
Mobile Device Security
Mobile devices are now used for a large part of the workload in a typical office. They’re handy for reading and replying to an email from anywhere. Most companies will not even consider using software these days if it doesn’t have a great mobile app.
Review security needs for employee devices that access business data and apps. Such as securing the phone with a passcode and keeping it properly updated.
Data Security
Data privacy regulations are something else that has been rising over the years. Most companies have more than one data privacy regulation requiring compliance.
Train employees on proper data handling and security procedures. This reduces the risk you’ll fall victim to a data leak or breach that can end up in a costly compliance penalty.
Need Help Keeping Your Team Trained on Cybersecurity?
Take training off your plate and train your team with cybersecurity professionals. J700 Group can help you with an engaging training program. One that helps your team change their behaviors to improve cyber hygiene.
When people hear the word cybersecurity, they often imagine complex systems, expensive software and specialist…
Read MoreAs we count down to midnight, most of us are thinking about gym memberships or…
Read MoreIt’s Christmas Eve in Lancashire. The Preston bypass is a nightmare, the last-minute dash to…
Read MoreFor many businesses, the Christmas period means quieter offices, reduced staffing and systems left running…
Read MoreOr: Why we’d like to have a word with Tim Cook this Christmas. There are…
Read MoreHackers Love Christmas: Learn Why your Business Could be at Risk This Holiday SeasonThe festive…
Read MoreIn recent months, high-profile companies like Land Rover and Co-op have made headlines due to…
Read MoreExplore 7 essential tips for effective cloud solutions comparison to find the best fit for…
Read MoreLearn how to secure business data for UK SMEs with this step-by-step guide focused on…
Read MoreCybersecurity basics explained for UK businesses—core concepts, major threats, essential safeguards, and compliance requirements. A…
Read MoreDiscover the essential role of IT support desks, core functions, key benefits, types of support,…
Read MoreDiscover 10 microsoft 365 alternatives for UK SMEs, comparing features and benefits to help your…
Read MoreDiscover the best microsoft 365 alternatives in our comparison of 10 top products to enhance…
Read MoreDiscover a business connectivity checklist with 7 actionable steps to boost IT reliability, security, and…
Read MoreDiscover 7 essential business continuity planning steps to protect your SME. Learn practical strategies for…
Read MoreSmall Business Office 365 comprehensive guide for UK SMEs: core features, setup process, security essentials,…
Read MoreSmall Business Office 365 guide for UK firms. Learn core features, setup, security, costs, and…
Read MoreSmall business Office 365 guide covering essential features, security, costs, local support, and practical benefits…
Read MoreFollow this cybersecurity checklist for SMEs to secure your business in Lancashire and Manchester. Step-by-step…
Read MoreFollow this cybersecurity checklist for SMEs to boost protection, reduce risks, and secure business data…
Read MoreCloud security explained: A comprehensive guide for UK businesses covering threat types, protection strategies, compliance,…
Read MoreData protection strategies for UK SMEs—types, key components, GDPR compliance, business risks, and best practices…
Read MoreWhy cybersecurity matters for UK businesses: core concepts, main risks, common threats, legal requirements, and…
Read MoreComprehensive guide to IT issues Lancashire businesses face, including security threats, system downtime, cloud solutions,…
Read MoreComprehensive guide on cyber security threats in the UK. Learn common types, key characteristics, real-world…
Read MoreFollow this IT security checklist for a step-by-step process to secure your business effectively in…
Read MoreExplore the benefits of managed IT services for businesses in Manchester and Lancashire, enhancing efficiency…
Read MoreExplore the role of cybersecurity in business. Understand its importance, how it works, and key…
Read MoreDiscover 7 key advantages of Microsoft 365 for SMEs that can enhance productivity, collaboration, and…
Read MoreExplore why use managed IT services and how they benefit businesses. Gain comprehensive insights on…
Read MoreComprehensive guide explaining cyber threats, focusing on their importance, how they work, and the key…
Read MoreDiscover what is business continuity and why it matters for your business's resilience, sustainability, and…
Read MoreDiscover effective ways to secure business data through a step-by-step process, ensuring the safety and…
Read MoreDiscover 7 key advantages of Microsoft 365 that can enhance your business operations and productivity…
Read MoreExplore local IT services explained in detail, focusing on their importance and how they work…
Read MoreExplore cloud application hosting, its importance, how it operates, and the key concepts behind it…
Read MoreExplore why choose cloud solutions for your business. Discover how they work, their importance, and…
Read MoreExplore cyber security services for small business, their importance, and how they protect against online…
Read MoreFollow this IT support checklist for a systematic approach to IT maintenance. Ensure smooth operations…
Read More